Pattern
Banner Background Image

Stay open for Business with Bitdefender. Compare and buy today.

Now with 30% OFF

How many devices are you looking to protect?

Count all the phones, laptops and desktops.

Select Subscription Options:

How to buy more than 100 devices

Operating systems covered: macOS | iOS | Linux | Windows

See details

GravityZone Business Security Premium + Add-ons

Old Price
% OFF

Your total price:

VAT not included

Price includes protection for:

  • 10 desktops and laptops
  • 4 file servers
  • 15 mailboxes
RECOMMENDED

GravityZone Business Security Premium

Old Price
% OFF

Your total price:

VAT not included

Price includes protection for:

  • 10 desktops and laptops
  • 4 file servers
  • 15 mailboxes

View product page

GravityZone Business Security

Old Price
% OFF

Your total price:

VAT not included

Price includes protection for:

  • 10 desktops and laptops
  • 3 file servers

View product page

Who is this product for?

Company type

For small to mid-sized

GravityZone Business Security Premium combined with our most popular add-ons.

For small to mid-sized

Proactive protection against advanced attacks and everyday threats.

For small to mid-sized

Easy-to-use and affordable protection.

Management options

Cloud/ On-premises
Cloud/ On-premises
Cloud/ On-premises

Skills Required

Intermediate IT and Cybersecurity skills
Minimal IT and Cybersecurity skills
Basic IT and no Cybersecurity skills

Types of endpoints protected

Security for Physical and Virtual Endpoints

close

Covers any virtual environment

close

Covers any virtual environment

close

Security for Mobile Devices

close

on-prem console only

close

on-prem console only

close

Security for Exchange Mail Servers

close

on-prem console only

close

on-prem console only

close

Technologies

Patch Management

Add-on
close
close
close

Full Disk Encryption

Add-on
close
close
close

Cloud-based Sandbox Threat Analyzer

close
close
close

User Tunable Machine Learning (HyperDetect™ )s

close
close
close

Fileless Attack Defense

close
close
close

Smart Centralized Scanning

close
close
close

Ransomware Mitigation

close
close
close

Network Attack Defense

close
close
close

Endpoint Risk Analytics

close
close
close

Exploit Defense

close
close
close

Process Inspector

close
close
close

Local and Cloud Machine Learning

close
close
close

Device & Application Control

close
close
close

Web Threat Protection

close
close
close

Technical requirements

Cloud

Windows Desktop

  • Windows 10 October 2020 Update (20H2)
  • Windows 10 May 2020 Update (20H1)
  • Windows 10 November 2019 Update (19H2)
  • Windows 10 May 2019 Update (19H1)
  • Windows 10 October 2018 Update (Redstone 5)
  • Windows 10 April 2018 Update (Redstone 4)
  • Windows 10 Fall Creators Update (Redstone 3)
  • Windows 10 Creators Update (Redstone 2)
  • Windows 10 Anniversary Update (Redstone 1)
  • Windows 10 November Update (Threshold 2) Requirements 13
  • Windows 10
  • Windows 8.1
  • Windows 8
  • Windows 7

Windows Tablet and Embedded

  • Windows 10 IoT Enterprise
  • Windows Embedded 8.1 Industry
  • Windows Embedded 8 Standard
  • Windows Embedded Standard 7
  • Windows Embedded Compact 7
  • Windows Embedded POSReady 7
  • Windows Embedded Enterprise 7

Windows Server

  • Windows Server 2019
  • Windows Server 2019 Core
  • Windows Server 2016
  • Windows Server 2016 Core
  • Windows Server 2012 R2
  • Windows Server 2012
  • Windows Small Business Server (SBS) 2011
  • Windows Server 2008 R2

Linux

  • Ubuntu 14.04 LTS or higher
  • Red Hat Enterprise Linux / CentOS 6.0 or higher(2)
  • SUSE Linux Enterprise Server 11 SP4 or higher
  • OpenSUSE Leap 42.x
  • Fedora 25 or higher(1)
  • Debian 8.0 or higher
  • Oracle Linux 6.3 or higher
  • Amazon Linux AMI 2016.09 or higher
  • Amazon Linux 2

macOS

  • macOS Big Sur (11.0)
  • macOS Catalina (10.15)
  • macOS Mojave (10.14)
  • macOS High Sierra (10.13)
  • macOS Sierra (10.12)
  • OS X El Capitan (10.11)

Mail Servers

Exchange Server 2016, 2013, 2010 Physical and virtual servers Roles: Edge, Hub and Mailbox Protocols: SMTP, MAPI, Exchange ActiveSync

Endpoint Hardware

Minimum : 2.4 GHz single-core CPU Recommended: 1.86 GHz or faster Intel Xeon multi-core CPU Memory: Minimum free RAM: 512 MB Recommended free RAM: 1 GB HDD space: 1.5 GB of free hard-disk space

Control Center Hardware

CPU: 4 vCPU with 2 GHz each Minimum RAM memory: 6 GB recommended 40 GB of free hard-disk space Internet access for updates and communication with remote and mobile endpoints.

Control Center web console

  • Internet Explorer 9+, Mozilla Firefox 14+,Google Chrome 15+, Safari 5+, Microsoft Edge 20+, Opera 16+
  • Recommended screen resolution: 1280 x 800 or higher

On-Premises

Windows Desktop

  • Windows 10 October 2020 Update (20H2)
  • Windows 10 May 2020 Update (20H1)
  • Windows 10 November 2019 Update (19H2)
  • Windows 10 May 2019 Update (19H1)
  • Windows 10 October 2018 Update (Redstone 5)
  • Windows 10 April 2018 Update (Redstone 4)
  • Windows 10 Fall Creators Update (Redstone 3)
  • Windows 10 Creators Update (Redstone 2)
  • Windows 10 Anniversary Update (Redstone 1)
  • Windows 10 November Update (Threshold 2)
  • Windows 10
  • Windows 8.1
  • Windows 8
  • Windows 7

Windows Tablet and Embedded

  • Windows 10 IoT Enterprise
  • Windows Embedded 8.1 Industry
  • Windows Embedded 8 Standard
  • Windows Embedded Standard 7
  • Windows Embedded Compact 7
  • Windows Embedded POSReady 7
  • Windows Embedded Enterprise 7

Windows Server

  • Windows Server 2019
  • Windows Server 2019 Core
  • Windows Server 2016
  • Windows Server 2016 Core
  • Windows Server 2012 R2
  • Windows Server 2012
  • Windows Small Business Server (SBS) 2011
  • Windows Server 2008 R2

Linux

  • Ubuntu 14.04 LTS or higher
  • Red Hat Enterprise Linux / CentOS 6.0 or higher
  • SUSE Linux Enterprise Server 11 SP4 or higher
  • OpenSUSE Leap 42.x
  • Fedora 25 or higher
  • Debian 8.0 or higher
  • Oracle Linux 6.3 or higher
  • Amazon Linux AMI 2016.09 or higher
  • Amazon Linux 2

macOS

  • macOS Big Sur (11.x)
  • macOS Catalina (10.15)
  • macOS Mojave (10.14)
  • macOS High Sierra (10.13)
  • macOS Sierra (10.12)

Endpoint Hardware

Min: 2.4 GHz single-core CPU Recommended: 1.86 GHz or faster Intel Xeon multi-core CPU - Memory: Minimum free RAM: 512 MB Recommended free RAM: 1 GB HDD space: 1.5 GB of free hard-disk space

Supported Formats and Virtualization Platforms

GravityZone delivered as a virtual appliance and is available in the following formats:
  • OVA (compatible with VMware vSphere, View)
  • XVA (compatible with Citrix XenServer, XenDesktop, VDI-in-a-Box)
  • VHD (compatible with Microsoft Hyper-V).
  • OVF (compatible with Red Hat Enterprise Virtualization)*
  • OVF (compatible with Oracle VM)*
  • RAW (compatible with Kernel-based Virtual Machine or KVM)* *OVF and RAW packages are archived in tar.bz2 format.
Support for other formats and virtualization platforms may be provided on request.

Control Center web console

  • Internet Explorer 9+, Mozilla Firefox 14+,Google Chrome 15+, Safari 5+, Microsoft Edge 20+, Opera 16+
  • Recommended screen resolution: 1280 x 800 or higher
cyber-resilience

Anti-Ransomware Capabilities

GravityZone provides the most effective protection from advanced malware, ransomware, zero-days, fileless and targeted attacks. Here’s how GravityZone protects your organization against ransomware attacks:

  • Multiple Blocking Layers. Endpoint and network, pre-execution and
    on-access, file-based and fileless
  • Multiple Detection Layers. Process inspection, registry monitoring,
    code inspection, Tunable Machine Learning (Hyper Detect)
  • Multiple Recovery Layers. Effective rollback from local machine or remote system
  • Adaptive Defenses. Advanced anti-exploit, adaptive heuristics,
    tunable machine learning
  • Risk Mitigation Technologies. Automatic vulnerability patching,
    system misconfigurations, user behavior
  • Tamperproof Backups. No use of vulnerable shadow copies,
    ransomware can’t delete the backups
  • Remote Ransomware Blocking Blocks remote and network
    ransomware attacks and blacklists attacker IPs
  • Enterprise-Wide Cleanup Kill processes remotely, easy global file
    quarantine and removal

Outstanding Security

Winner of the AV-Comparatives yearly award for outstanding results across the board including real world protection, performance, malware removal and low false positive.

Cybersecurity for Small Businesses: Why It Is Important?

Regardless of operating industry or size, each and every company has weaknesses that hackers exploit for their own gain and make them vulnerable to cyberattacks. According to Verizon (DBIR 2020 Report) 28% of the attacks engage small businesses putting their business continuity, money, data and IT equipment at risk. Hackers target small businesses because small businesses often lack a cyberattack response plan, relying on antivirus software and firewalls for protection.

 

Can I try before I buy?

Yes, you can try before you buy. In just a few clicks, you can get a FREE trial of GravityZone so you can put our technologies through their paces. Before the trial period ends, if you want to continue using the services, you must opt for a paid subscription plan and make the purchase.

 

How do I renew my license?

You can renew it online or through a partner, whatever suits you best. Online you just need to enter your current GravityZone solution license key, choose the number of endpoints and years you wish to renew your license for and you’re all set.

How can GravityZone protect small businesses against advanced attacks?

GravityZone is designed on industry’s best prevention, detection and blocking capabilities offering multi-layered endpoint protection solutions. It uses sophisticated antivirus and antimalware with behavioral monitoring, zero-day threat protection, firewall, application, device and content controls to prevent, detect and tackle advanced, evasive exploits and targeted attacks.

 

What is the licensing model?

Business Security, Advanced Business Security and Elite solutions are available for purchase either online or with one of our partners. Online, you can choose between 1, 2 or 3 years coverage and cover up to 100 endpoints. You can also add extra licenses, anytime you need it. If you need protection for more endpoints, you can contact one of our official partners in your region. Find your nearest partners using our partner locator.

 

What is the difference between on premise and cloud?

In an on-premises environment, resources are deployed in-house and within an enterprise’s IT infrastructure, while in a cloud environment resources are hosted on the premises of the service provider.